Keywords: evolutionary modeling, simulation, genetic algorithm, threats to information security, information security tools, security system configuration, data protection
The model for evaluating the effectiveness of an information security system configuration based on genetic algorithms
UDC 004.056+004.051+004.89
DOI: 10.26102/2310-6018/2020.30.3.022
The article presents the hierarchical structure of settings for information security tools, introduced criteria for evaluating the effectiveness of security systems, formalizes the concept of “security system configuration” based on evolutionary modeling objects, such as population, chromosome (solution vector), fitness function, etc. The mathematical model for constructing a security system using artificial intelligence methods has been developed. The proposed system is characterized by the possibility of considering the influence of random factors (staff, equipment failures, attack time on the security system) when choosing a protection option and the ability of adapting the protection system to changing environmental conditions. This model allows to use it not only in the professional activities of information security specialists, but also in training process as a kind of simulator. The development of an effective information security system using a genetic algorithm is possible on the basis of system monitoring events data, data received from experts and during simulation of the protection system. Thus, the research results have an applied nature and can be used in developments related to the design of information systems, decision support systems in the field of information security.
1. FSTEK pro otsenku effektivnosti IB (FSTEC about the assessment of the effectiveness of information security) Dostupno po adresu: https://bis-expert.ru/blog/2560/49379 (In Russ) (data obrashcheniya 19.05.2020 g.).
2. Otsenka kachestva SZI na osnove analiza profilia bezopasnosti (Evaluation of the quality of information security tools based on the analysis of the security profile) Dostupno po adresu:https://studwood.ru/1615883/informatika/otsenka_kachestva_osnove_analiza_profi lya_bezopasnosti (In Russ) (data obrashcheniya 19.05.2020 g.).
3. Metodika otsenki sootvetstviia informatsionnoi bezopasnosti organizatsii bankovskoi sistemy Rossiiskoi Federatsii trebovaniiam STO BR IBBS-1.0-2014 (Methodology for assessing the compliance of information security of organizations of the banking system of the Russian Federation with the requirements of STO BR IBBS-1.0-2014) Dostupno po adresu: https://www.garant.ru/products/ipo/prime/doc/70567284/ (In Russ) (data obrashcheniya 19.05.2020 g.).
4. Otsenka zashchity informatsii (Assessment of information security) Dostupno po adresu: https://spravochnick.ru/informacionnaya_bezopasnost/ocenka_zaschity_informacii/ (In Russ) (data obrashcheniya 19.05.2020 g).
5. Prikaz FSTEK RF ot 11 fevralia 2013 g. N 17 «Ob utverzhdenii trebovanii o zashchit einformatsii, ne sostavliaiushchei gosudarstvennuiu tainu, soderzhashcheisia v gosudarstvennykh informatsionnykh sistemakh».) Dostupno po adresu: https://fstec.ru/normotvorcheskaya/akty/53-prikazy/702-prikaz-fstek-rossii-ot-11-fevralya2013-g-n-17 (In Russ) (data obrashcheniya 19.05.2020 g.).
6. Aktual'nye kiberugrozy I kvartal 2019 goda. Dostupno po adresu: https://www.ptsecurity.com/ru-ru/research/analytics/cybersecurity-threatscape-q1-2019/ (In Russ) (data obrashcheniya 19.05.2020 g.).
7. Check Point na maksimum. Chelovecheskii faktor v informatsionnoi bezopasnosti. Dostupno po adresu: https://habr.com/ru/company/tssolution/blog/334052/ (In Russ) (data obrashcheniya 19.05.2020 g.).
8. Shreider M.Iu., Borovskii A.S., Tarasov A.D. Design of physical protection systems using a genetic algorithm. Vestnik evraziiskoi nauki. 2017;4(41). Dostupno po adresu:: https://cyberleninka.ru/article/n/proektirovanie-sistem-fizicheskoy-zaschity-s-pomoschyugeneticheskogo-algoritma (In Russ) (data obrashcheniya 19.05.2020 g.).
9. Davidiuk N.V. Development of a decision support system to ensure the physical security of facilities. Cand.tech.sci. diss. Astrakhan, ASTU Publ., 2010.In Russ)
10. Davidiuk N.V., Belov S.V. Protsedura effektivnogo razmeshcheniia sredstv obnaruzheniia na ob"ektezashchity s ispol'zovaniem metoda geneticheskogo poiska [The procedure for the effective placement of detection tools at the facility using the genetic search method]. Informatsiiai bezopasnost' - Information and Security. 2009;12(4):559-568(In Russ)
11. Vlasov A.O. Formirovanie baz yreshajushhih pravil systemy obnaruzhenij aatak s pomoshh'ju geneticheskogo algoritma.Bezopasnost' informacionnogo prostranstva: materialy XII Vserossijskoj nauchno-prakticheskoj. konferencii studentov, aspirantov I molodyh uchenyh [Information Space Security: Materials of the XII All-Russian Scientific and Practical Conference of Students, Postgraduates and Young Scientists]. Ekaterinburg. 2014: 126-133.(In Russ)
12. Kiselev D.Ju., Kiselev Ju.V., Bibikov V.V. Imitacionnoe modelirovanie informacionnyh sistem v pakete Arena. Samara, 2014.In Russ)
13. Kurilov F.M. Modelirovanie system zashchity informatsii. Prilozhenie teorii grafov [Modeling of information security systems. Application of graph theory]. Tekhnicheskienauki: teoriiaipraktika: materialy III Mezhdunar. nauch. konf. [Technical Sciences: theory and practice: proceedings of the III International scientific conference]. Chita.2016:6-9(In Russ)
14. Sait kompanii-razrabotchika sistemy imitatsionnogo modelirovaniia AnyLogic. Dostupno po adresu: http://www.anylogic.ru (In Russ) (data obrashcheniya 20.05.2020 g.).
15. Bank dannykh ugroz bezopasnosti informatsii FSTEK Rossii. Dostupno po adresu: https://bdu.fstec.ru/vul/2018-00979 (In Russ) (data obrashcheniya 20.05.2020 g)
16. Davidiuk N.V., Belov S.V. Formation of the initial population in the genetic search procedure for the option of effective location of the detection means at the object of protection. Vestnik Astrakhanskogo gosudarstvennogo tekhnicheskogo universiteta. Seriia: upravlenie, vychislitel'naia tekhnika I informatika - Bulletin of the Astrakhan State Technical University. Series: control, computer engineering and informatics. 2010;1:114- 118. (In Russ)
Keywords: evolutionary modeling, simulation, genetic algorithm, threats to information security, information security tools, security system configuration, data protection
For citation: Kuchin I.Y., Kosmacheva I.M., Davidyuk N.V., Sibikina I.V. The model for evaluating the effectiveness of an information security system configuration based on genetic algorithms. Modeling, Optimization and Information Technology. 2020;8(3). URL: https://moit.vivt.ru/wp-content/uploads/2020/08/KosmachevaSoavtors_3_20_1.pdf DOI: 10.26102/2310-6018/2020.30.3.022 (In Russ).
Published 30.09.2020